I've never seen a case where a supposedly critical IE security issue could actually result in undetected malware execution on my machine-it would be caught someplace. Good security is about having multiple layers, such as latest IE, latest released OS, 64-bit, UAC, Protected Mode, EMET, security suite (integrated 2-way firewall, anti-virus, anti-malware, heuristics, etc.). XP users are far more vulnerable to exploits than users of newer operating systems and are frequently targeted, as they specifically were with this latest IE exploit. It's irresponsible of you to claim that XP has security when it has none. I mentioned the preview in my post #10 and chose not to install it because I value stability and functionality, you can do what you want. MS Enhanced Mitigation Experience Toolkit v3 is what Microsoft recommends, the Tech Preview is just that, beta code which Microsoft explicitly says isn't ready for deployment. Cloning is primitive, I use 15-minute interval near-continuous backup. Massive hardware upgrade, clean install of newer drivers, patches are now available to fix earlier problems, newer software or not installing older software will fix problems, Windows Media Center database has to be rebuilt from scratch to support CableCARD tuner (way worse than Windows reinstall), subsequent DRM ties me to the current machine and Windows installation so I want it to be clean, numerous other reasons. It's arrogant of you to assume that you know why I'm going to reinstall Windows. #32, Fredward, this is cheaper than the commercial license for 010.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |